Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:55

General

  • Target

    2fc5366475ba4117e7f3d3c8c452e9ef02e75dbf965949812d5dbfdfd20eb780.exe

  • Size

    1.3MB

  • MD5

    a5b102cb6be839f8a133defd31ab06ad

  • SHA1

    c0959ef0729bd3d3c8c78cc5add66095f14565f3

  • SHA256

    2fc5366475ba4117e7f3d3c8c452e9ef02e75dbf965949812d5dbfdfd20eb780

  • SHA512

    49081ec0d0d4fd0b5b71058178386880c5adf8f0695a4feac06376378e7165de2ff6c40bff43c07a36739a34ef33ab053c64a1e3b3455c3e2081a3a45f12a752

  • SSDEEP

    24576:Ky0JM6gTcJHywju3okNPpLiS+o4kbsDt7xjbl0x+aGfLebQ:RNWSKCXRCo4kbitlj50oLY

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fc5366475ba4117e7f3d3c8c452e9ef02e75dbf965949812d5dbfdfd20eb780.exe
    "C:\Users\Admin\AppData\Local\Temp\2fc5366475ba4117e7f3d3c8c452e9ef02e75dbf965949812d5dbfdfd20eb780.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9422395.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9422395.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9219108.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9219108.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7808932.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7808932.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2058597.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2058597.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2904
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2556
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2576
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9422395.exe

    Filesize

    1.2MB

    MD5

    1fe8a509917c25ced638b9780973499c

    SHA1

    ab2e6fde0f431581613e6b136af83b257a575e23

    SHA256

    b6af0c908827e72621a698a13a11ea705fc5c9c1388cb4c970918d95d183495a

    SHA512

    d71760df64b3eb6a01f38f1105ed9748be85a61a5bd110ed90001a77e39836c3e03181b2c89281d9989034db361304cfa9ed236c410dd1703641f21300c08226

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9422395.exe

    Filesize

    1.2MB

    MD5

    1fe8a509917c25ced638b9780973499c

    SHA1

    ab2e6fde0f431581613e6b136af83b257a575e23

    SHA256

    b6af0c908827e72621a698a13a11ea705fc5c9c1388cb4c970918d95d183495a

    SHA512

    d71760df64b3eb6a01f38f1105ed9748be85a61a5bd110ed90001a77e39836c3e03181b2c89281d9989034db361304cfa9ed236c410dd1703641f21300c08226

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9219108.exe

    Filesize

    1.0MB

    MD5

    957fe2ddf55215b213ecc4dfebc29f2a

    SHA1

    37408a341dd3255cd93c67878289d5bdff960c64

    SHA256

    c1bc2f0574977707a8959b7a8c588e1395f8640c713d0de1ec1f981543938668

    SHA512

    3c4def5222cb6b06f61c365ea71d7b275840813a67842bde9d2e54dcd82ef982e0fbce7512a9d5d0f58093ce013da2fa0cb67cc1c58d5053ac65e83c5f44f42e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9219108.exe

    Filesize

    1.0MB

    MD5

    957fe2ddf55215b213ecc4dfebc29f2a

    SHA1

    37408a341dd3255cd93c67878289d5bdff960c64

    SHA256

    c1bc2f0574977707a8959b7a8c588e1395f8640c713d0de1ec1f981543938668

    SHA512

    3c4def5222cb6b06f61c365ea71d7b275840813a67842bde9d2e54dcd82ef982e0fbce7512a9d5d0f58093ce013da2fa0cb67cc1c58d5053ac65e83c5f44f42e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7808932.exe

    Filesize

    889KB

    MD5

    e72b6c3cb3ff3bb9076f4d1f05a09eb2

    SHA1

    cb8dabb8463a5dcef839cc76eddc65d8ca080919

    SHA256

    52536080032ca049ccc236c3ae7b54993dca3c367a047f54ea0679bcc3ee636b

    SHA512

    770ee19e6c690b9e5cce88d3bc83f564a678f09f04aef83f4fd3bd6f0b50041cd737a3e86597da0280b1522ac1cdcd93e928d7815fd23b9c06eaa7c830b2e038

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7808932.exe

    Filesize

    889KB

    MD5

    e72b6c3cb3ff3bb9076f4d1f05a09eb2

    SHA1

    cb8dabb8463a5dcef839cc76eddc65d8ca080919

    SHA256

    52536080032ca049ccc236c3ae7b54993dca3c367a047f54ea0679bcc3ee636b

    SHA512

    770ee19e6c690b9e5cce88d3bc83f564a678f09f04aef83f4fd3bd6f0b50041cd737a3e86597da0280b1522ac1cdcd93e928d7815fd23b9c06eaa7c830b2e038

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2058597.exe

    Filesize

    498KB

    MD5

    425d1374932e06427aa2584684564b7b

    SHA1

    28632ce2d1ab1d2c923bf04be23c81f9b5bb7cc9

    SHA256

    c38ba12da42428ca27995cdd4defa810886e170eaf7c842c3cbaa85a6e566378

    SHA512

    6b8d70ba02ac12952f757d281b0bfdf61d5741c2db3ec290833ba31d36cf1a6f5f25208270b68c3b7c902e61561cfd222401e86781479bd01deb51e866b27d47

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2058597.exe

    Filesize

    498KB

    MD5

    425d1374932e06427aa2584684564b7b

    SHA1

    28632ce2d1ab1d2c923bf04be23c81f9b5bb7cc9

    SHA256

    c38ba12da42428ca27995cdd4defa810886e170eaf7c842c3cbaa85a6e566378

    SHA512

    6b8d70ba02ac12952f757d281b0bfdf61d5741c2db3ec290833ba31d36cf1a6f5f25208270b68c3b7c902e61561cfd222401e86781479bd01deb51e866b27d47

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9422395.exe

    Filesize

    1.2MB

    MD5

    1fe8a509917c25ced638b9780973499c

    SHA1

    ab2e6fde0f431581613e6b136af83b257a575e23

    SHA256

    b6af0c908827e72621a698a13a11ea705fc5c9c1388cb4c970918d95d183495a

    SHA512

    d71760df64b3eb6a01f38f1105ed9748be85a61a5bd110ed90001a77e39836c3e03181b2c89281d9989034db361304cfa9ed236c410dd1703641f21300c08226

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9422395.exe

    Filesize

    1.2MB

    MD5

    1fe8a509917c25ced638b9780973499c

    SHA1

    ab2e6fde0f431581613e6b136af83b257a575e23

    SHA256

    b6af0c908827e72621a698a13a11ea705fc5c9c1388cb4c970918d95d183495a

    SHA512

    d71760df64b3eb6a01f38f1105ed9748be85a61a5bd110ed90001a77e39836c3e03181b2c89281d9989034db361304cfa9ed236c410dd1703641f21300c08226

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9219108.exe

    Filesize

    1.0MB

    MD5

    957fe2ddf55215b213ecc4dfebc29f2a

    SHA1

    37408a341dd3255cd93c67878289d5bdff960c64

    SHA256

    c1bc2f0574977707a8959b7a8c588e1395f8640c713d0de1ec1f981543938668

    SHA512

    3c4def5222cb6b06f61c365ea71d7b275840813a67842bde9d2e54dcd82ef982e0fbce7512a9d5d0f58093ce013da2fa0cb67cc1c58d5053ac65e83c5f44f42e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9219108.exe

    Filesize

    1.0MB

    MD5

    957fe2ddf55215b213ecc4dfebc29f2a

    SHA1

    37408a341dd3255cd93c67878289d5bdff960c64

    SHA256

    c1bc2f0574977707a8959b7a8c588e1395f8640c713d0de1ec1f981543938668

    SHA512

    3c4def5222cb6b06f61c365ea71d7b275840813a67842bde9d2e54dcd82ef982e0fbce7512a9d5d0f58093ce013da2fa0cb67cc1c58d5053ac65e83c5f44f42e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7808932.exe

    Filesize

    889KB

    MD5

    e72b6c3cb3ff3bb9076f4d1f05a09eb2

    SHA1

    cb8dabb8463a5dcef839cc76eddc65d8ca080919

    SHA256

    52536080032ca049ccc236c3ae7b54993dca3c367a047f54ea0679bcc3ee636b

    SHA512

    770ee19e6c690b9e5cce88d3bc83f564a678f09f04aef83f4fd3bd6f0b50041cd737a3e86597da0280b1522ac1cdcd93e928d7815fd23b9c06eaa7c830b2e038

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7808932.exe

    Filesize

    889KB

    MD5

    e72b6c3cb3ff3bb9076f4d1f05a09eb2

    SHA1

    cb8dabb8463a5dcef839cc76eddc65d8ca080919

    SHA256

    52536080032ca049ccc236c3ae7b54993dca3c367a047f54ea0679bcc3ee636b

    SHA512

    770ee19e6c690b9e5cce88d3bc83f564a678f09f04aef83f4fd3bd6f0b50041cd737a3e86597da0280b1522ac1cdcd93e928d7815fd23b9c06eaa7c830b2e038

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2058597.exe

    Filesize

    498KB

    MD5

    425d1374932e06427aa2584684564b7b

    SHA1

    28632ce2d1ab1d2c923bf04be23c81f9b5bb7cc9

    SHA256

    c38ba12da42428ca27995cdd4defa810886e170eaf7c842c3cbaa85a6e566378

    SHA512

    6b8d70ba02ac12952f757d281b0bfdf61d5741c2db3ec290833ba31d36cf1a6f5f25208270b68c3b7c902e61561cfd222401e86781479bd01deb51e866b27d47

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2058597.exe

    Filesize

    498KB

    MD5

    425d1374932e06427aa2584684564b7b

    SHA1

    28632ce2d1ab1d2c923bf04be23c81f9b5bb7cc9

    SHA256

    c38ba12da42428ca27995cdd4defa810886e170eaf7c842c3cbaa85a6e566378

    SHA512

    6b8d70ba02ac12952f757d281b0bfdf61d5741c2db3ec290833ba31d36cf1a6f5f25208270b68c3b7c902e61561cfd222401e86781479bd01deb51e866b27d47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2510841.exe

    Filesize

    860KB

    MD5

    2124752503a8a38251f840697a37dfb7

    SHA1

    f0d367cf0132e16f5b468a662396e298204ee9fc

    SHA256

    afa47364fdf31b0973191d039b88064068037bcc8c8f987b5116546b83e19193

    SHA512

    65636f22191117b94cc9e04d1936713a25fa8a9955bbcc02ca0c98e42be23fb54c222c28fa64a57c8a93f819ea8164b8ac39b087fa4c09c2fde7970e7db115eb

  • memory/2576-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2576-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB